{"title":"From the Internet of Things to the web of things — enabling by sensing as-a service","authors":"S. Mathew, Yacine Atif, M. Barachi","doi":"10.1109/INNOVATIONS.2016.7880055","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880055","url":null,"abstract":"Sensing as a Service (SenaaS) is emerging as a prominent element in the middleware linking together the Internet of Things (IoT) and the Web of Things (WoT) layers of future ubiquitous systems. An architecture framework is discussed in this paper whereby things are abstracted into services via embedded sensors which expose a thing as a service. The architecture acts as a blueprint to guide software architects realizing WoT applications. Web-enabled things are eventually appended into Web platforms such as Social Web platforms to drive data and services that are exposed by these things to interact with both other things and people, in order to materialize further the future social Web of Things. Research directions are discussed to illustrate the integration of SenaaS into the proposed WoT architectural framework.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128143004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overview of fingerprinting methods for local text reuse detection","authors":"Leena Lulu, B. Belkhouche, S. Harous","doi":"10.1109/INNOVATIONS.2016.7880050","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880050","url":null,"abstract":"We overview several local text reuse detection methods based on fingerprinting techniques. We first define the context of local text reuse and situate it within the general spectrum of information retrieval in order to pinpoint its particular applicability and challenges. After a brief description of the major text reuse detection approaches, we introduce the general principles of fingerprinting algorithms from an information retrieval perspective. Three classes of fingerprinting methods (overlap, non-overlap, and randomized) are surveyed. Specific algorithms, such as k-gram, winnowing, hailstorm, DCT and hash-breaking, are described. The performance and characteristics of these algorithms are summarized based on data from the literature.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125865516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Massinissa Belazzoug, Salih Aidel, I. Messaoudene, B. Hammache, Farouk Chetouah, Youcef Braham Chaouche
{"title":"A reconfigurable cylindrical dielectric resonator antenna for WiMAX/WLAN applications","authors":"Massinissa Belazzoug, Salih Aidel, I. Messaoudene, B. Hammache, Farouk Chetouah, Youcef Braham Chaouche","doi":"10.1109/INNOVATIONS.2016.7880018","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880018","url":null,"abstract":"The main objective of the present study is to achieve the reconfigurability of a cylindrical dielectric resonator antenna (CDRA). The CDRA is excited with two different modes; the HEMjjg mode is excited via an aperture etched on the ground under the center of the CDRA, where the TM01δ mode is excited from an etched slot under the side of the CDRA, the reconflgurabilty is realized using two PIN diodes. Two different cases of PIN diode (D1-ON/D2-OFF and vice versa) are investigated and analyzed. The proposed cylindrical dielectric resonator antenna (CDRA) can provides two bands around 3.77 GHz and 5.5 GHz with a reflection coefficient below than −10dB which is appropriate for WiMAX and WLAN applications, respectively. The antenna gain is stable in the two bands 3.77GHz/5.5GHz with 3.8 dBi and 4.43dBi, respectively. The simulation is performed using two simulators; the CST Microwave Studio and the HFSS Ansoft package.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132795671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capstone project on speech morphing: A highlight to undergraduate education on signal processing","authors":"L. Weruaga, Abdulqader Mahmoud, R. Shubair","doi":"10.1109/INNOVATIONS.2016.7880024","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880024","url":null,"abstract":"Signal processing is a core discipline in electrical and computer engineering (ECE). The mathematical language adopted in the classroom and the laboratory support, usually limited to verification, pose the risk of hiding the enormous practical connotations of the discipline. This paper suggests to strengthen the bridge between theory and practice by means of selected capstone projects, designed according to constructivist principles. The project detailed in this paper tackles a large number of fundamental aspects of the discipline through a storyline that captivates the student during its execution.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123354852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic enterprise service bus for cultural heritage","authors":"A. Capodieci, L. Mainetti, S. Carrozzo","doi":"10.1109/INNOVATIONS.2016.7880044","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880044","url":null,"abstract":"The problem of data flooding is becoming more and more important, and it is necessary to find a way to access relevant information and to collect information and data from different data sources. In the field of cultural heritage, users need to be able to find and extract information from databases of specific contexts (paintings, inscriptions, churches, old coins, etc.). The problem is that each of these databases has a different data model. A project created to solve this problem is Europeana, which aims to bring together data from different providers (museums, libraries or other entities) in a single dataset. This paper aims to propose an architecture for a heterogeneous data sources system for the integration of structured/semi-structured data sources, enabling the information content to be more accessible and searchable for users. The data integration model proposed in this paper aims to exploit the method of \"schema matching\", using ontology-based data integration techniques by automating the integration process.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121520067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEFP: An application layer protocol for Islamic electronic fatawa management and security","authors":"E. Taqieddin, Yarub A. Wahsheh","doi":"10.1109/INNOVATIONS.2016.7880037","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880037","url":null,"abstract":"With the unfortunate increase of terrorist attacks and the attempts to tarnish the real image of Islam, irresponsible Islamic legal decisions (Fatwas) are used to mislead some Muslims and Non-Muslims to make incorrect conclusions. The widespread of communication technologies opens a huge challenge of E-Fatawa management. In this study, we present a novel application layer protocol for electronic Fatwas to meet the need for management rules to prevent irresponsible Fatwas. We propose a global structure for E-Fatawa with security services that guarantee, Mufti authentication, data integrity and non-repudiation. A proof of concept implementation shows that the protocol is easy to implement, feasible in terms of delay and key management, and protocol messages are flexible to be encoded in other application layer protocols.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129104218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure kNN queries over outsourced spatial data for location-based services","authors":"Ayesha M. Talha, I. Kamel, Z. Aghbari","doi":"10.1109/INNOVATIONS.2016.7880038","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880038","url":null,"abstract":"Cloud computing allows data owners to outsource their databases, eliminating the need for costly storage and computational resources. The key is to maintain data confidentiality with respect to third-party service providers along with providing query results in real-time to authorized users. In this paper, a transformation and encryption approach is proposed for spatial databases, where the service provider executes queries and returns results to the users. First, the approach uses the space-filling Hilbert curve to map each spatial point in the multidimensional space to a one-dimensional space. Next, the order-preserving encryption technique is applied to the transformed spatial data. The user issues spatial kNN queries to the service provider based on the Hilbert values and then uses the encryption key to decrypt the query response returned. Experiments are conducted to show that this approach reduces the query communication cost between the authorized user and the service provider.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130748673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for building undergraduate student research skills through an independent engineering study course","authors":"R. Shubair, Hadeel Elayan, M. AlHajri, A. Goian","doi":"10.1109/INNOVATIONS.2016.7880026","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880026","url":null,"abstract":"This paper presents a framework for the undergraduate research experience that Electrical and Computer Engineering (ECE) Senior Undergraduate students at Khalifa University, UAE pursue through a fourth-year technical elective course entitled Independent Study that is one-semester long. This course is an excellent example of self-directed learning as one of the most influential educational experiences that students might get involved in. Through this Independent Study course, the student has the opportunity to work individually and independently on an engineering research project, at an undergraduate level, under the supervision of an ECE faculty member. The faculty member acts as the research project academic supervisor. He provides guidance, gives technical advice, helps in setting milestone, defines a road-map, agrees on deliverables, verifies the objectives are met and outcomes are achieved, and finally evaluates the student performance upon the completion of the Independent Study project, by the end of the semester. The successful delivery of the Independent Engineering Study course at the undergraduate level is demonstrated through two real case studies, which involved state-of-the-art research on two prominent topics: \"In Vivo Wireless Body Communication\" and \"Novel Localization Methods in Wireless Sensor Networks\".","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131762693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facial features monitoring for real time drowsiness detection","authors":"B. Manu","doi":"10.1109/INNOVATIONS.2016.7880030","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880030","url":null,"abstract":"This paper describes an efficient method for drowsiness detection by three well defined phases. These three phases are facial features detection using Viola Jones, the eye tracking and yawning detection. Once the face is detected, the system is made illumination invariant by segmenting the skin part alone and considering only the chromatic components to reject most of the non face image backgrounds based on skin color. The tracking of eyes and yawning detection are done by correlation coefficient template matching. The feature vectors from each of the above phases are concatenated and a binary linear support vector machine classifier is used to classify the consecutive frames into fatigue and nonfatigue states and sound an alarm for the former, if it is above the threshold time. Extensive real time experiments prove that the proposed method is highly efficient in finding the drowsiness and alerting the driver.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"19 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127092341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New model of emergency communication for disaster relief in remote areas","authors":"A. E. Aburawi, S. Salic, M. Krampell","doi":"10.1109/INNOVATIONS.2016.7880019","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880019","url":null,"abstract":"Even in the 21st century, modern communication technology is still affected by natural disasters and political turmoil which threaten people's lives and make the Internet or mobile phone networks unavailable for use. This work is based on constructive research which resulted in a proof of concept system that uses shortwave radio technology to provide a oneway communication system. A message that a user writes on their smartphone, which is connected to a small preset transmitter, is sent out to a receiver in another part of the world where the message can then be posted on the Internet. This system is a cheaper alternative to other shortwave radio transmitters, and has potential for improvement.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124371731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}